CN106650425A - Method and device for controlling security sandbox - Google Patents

Method and device for controlling security sandbox Download PDF

Info

Publication number
CN106650425A
CN106650425A CN201611111596.8A CN201611111596A CN106650425A CN 106650425 A CN106650425 A CN 106650425A CN 201611111596 A CN201611111596 A CN 201611111596A CN 106650425 A CN106650425 A CN 106650425A
Authority
CN
China
Prior art keywords
control
control device
virtual machine
operation system
assigned operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611111596.8A
Other languages
Chinese (zh)
Other versions
CN106650425B (en
Inventor
姜楠
马铮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201611111596.8A priority Critical patent/CN106650425B/en
Publication of CN106650425A publication Critical patent/CN106650425A/en
Application granted granted Critical
Publication of CN106650425B publication Critical patent/CN106650425B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of invention provides a method and a device for controlling security sandbox, relates to the field of network security, and can enhance analysis efficiency of the security sandbox.. The method comprises the steps that a control device of the security sandbox acquires control information which includes a first control command and configuration parameters, the first control command is used for ordering the security sandbox to generate a first virtual machine with the designated operating system, the configuration parameters are used for modifying the system parameters of the operating system; the control device generates the first virtual machine with the designated operating system according to the first control command; the control device modifies the system parameters of the designated operating system according to the configuration parameters to let the specified operating system with modified parameters to form a simulated operating environment, and the simulated operating environment is used for running the program to be monitored.

Description

A kind of control method and device of security sandbox
Technical field
The present invention relates to network safety filed, more particularly to a kind of control method and device of security sandbox.
Background technology
Security sandbox is the analysis tool that a kind of behavior to unknown program is analyzed, and can effectively analyze unknown journey Whether sequence has to the main frame or operating system of user and threatens, and analyzes the safety that the unknown program is utilized when finding and threatening Leak, attack mode, threat degree etc., to help user to judge whether the unknown program should be blocked, and help user Find the solution for tackling the unknown program.
Traditional security sandbox is typically based on the Typical Disposition of specific one operating system and is provided for running unknown journey The running environment of sequence.For example, when the Typical Disposition of windows operating systems is the just installation of windows operating systems, The default system parameter configuration of windows operating systems, including windows carry firewall configuration, allow to use agreement, Open port etc..But as user uses operating system, various application software are installed in main frame, in this process, Operation change of the systematic parameter of main frame such as user.For example, windows operating systems acquiescence closes TELNET ports, And with the installation of some application software, the TELNET ports for causing the main frame are opened.Assume that certain program utilizes TELNET ports Other network equipments are controlled, because the running environment in traditional security sandbox is matched somebody with somebody based on the typical case of windows operating systems Install, therefore, traditional security sandbox cannot just find the program using the operation performed by TELNET ports, so as to lead Apply family cannot determine the program be with threaten program.Therefore, the analysis efficiency of traditional security sandbox is relatively low.
The content of the invention
Embodiments of the invention provide a kind of control method and device of security sandbox, it is possible to increase the analysis of security sandbox Efficiency.
To reach above-mentioned purpose, embodiments of the invention are adopted the following technical scheme that:
In a first aspect, the embodiment of the present invention provides a kind of control method of security sandbox, methods described includes:
The control device of security sandbox obtains control information, and the control information includes the first control instruction and configuration ginseng Number, first control instruction is used to indicate that the security sandbox generates the first virtual machine with assigned operation system, described Configuration parameter is used to change the systematic parameter of the operating system;
The control device generates described first empty with the assigned operation system according to first control instruction Plan machine;
The control device is modified according to the configuration parameter to the systematic parameter of the assigned operation system, so that The assigned operation system after parameter must be changed and form dry run environment, the dry run environment is to be monitored for running Program.
In the first possible implementation of first aspect, the number of first virtual machine is M, M first The virtual machine of each in virtual machine first has a kind of assigned operation system, and M > 1, M is integer,
The control device is modified according to the configuration parameter to the systematic parameter of the assigned operation system, bag Include:
The control device is to each the assigned operation system in M assigned operation system according to the configuration parameter System parameter is modified;
The control information also includes the second control instruction, and second control instruction is used to control the control device company The M the first virtual machine is connect, the control device is specified according to the configuration parameter to each in M assigned operation system After the systematic parameter of operating system is modified, methods described also includes:
The control device is attached the M the first virtual machine according to second control instruction, so that institute Dry run environment is stated including the assigned operation system after M modification parameter.
It is described in second possible implementation with reference to the first possible implementation of above-mentioned first aspect Control information also includes the 3rd control instruction, and the 3rd control instruction is used to control the control device generation background traffic, After the control device is attached the M the first virtual machine according to second control instruction, methods described is also wrapped Include:
The control device controls M first virtual machine and generates the background stream according to the 3rd control instruction Amount, so that the dry run environment has the background traffic.
With reference to above-mentioned in a first aspect, in the third possible implementation of first aspect, the control information is also wrapped The 4th control instruction is included, the 4th control instruction is used to indicate that the control device is connected at least one second virtual machines In the dry run environment, each second virtual machine in described at least one second virtual machines is provided with a kind of network work( Can, it is described after the control device is modified according to the configuration parameter to the systematic parameter of the assigned operation system Method also includes:
Described at least one second virtual machines are connected to the mould by the control device according to the 4th control instruction Intend running environment in so that the dry run environment include modification parameter after the assigned operation system and it is described at least A kind of network function.
Can with reference to the first possible implementation to the third of first aspect of above-mentioned first aspect or first aspect Any one implementation in the implementation of energy, in the third possible implementation, the control device forms described After dry run environment, methods described also includes:
The control device receives the program to be monitored;
The control device control described program is run in the dry run environment;
The control device records and analyzes the behavior that produces when described program is run in the dry run environment, with Obtain the behavior monitoring report of described program;
The control device shows the behavior monitoring report.
Second aspect, the embodiment of the present invention provides a kind of control device of security sandbox, including:
Acquiring unit, for obtaining control information, the control information includes the first control instruction and configuration parameter, described First control instruction is used to indicate that the security sandbox generates the first virtual machine with assigned operation system, the configuration parameter For changing the systematic parameter of the operating system;
The dispensing unit, first control instruction for being obtained according to the acquiring unit is generated has the finger Determine first virtual machine of operating system;
The dispensing unit, for the configuration parameter that obtained according to the acquiring unit to the assigned operation system Systematic parameter modify so that modification parameter after the assigned operation system formed dry run environment, the mould Intending running environment is used to run program to be monitored.
In the first possible implementation of second aspect, first virtual machine that the dispensing unit is generated Number is M, and each first virtual machine in M the first virtual machine has a kind of assigned operation system, and M > 1, M is integer,
The dispensing unit, specifically for according to the configuration parameter to each the specified behaviour in M assigned operation system The systematic parameter for making system is modified;
The control information that the acquiring unit is obtained also includes the second control instruction, and second control instruction is used for Control the dispensing unit and connect M first virtual machine,
The dispensing unit, be additionally operable to according to the configuration parameter to each the specified behaviour in M assigned operation system Make system systematic parameter modify after, the M the first virtual machines are attached according to second control instruction, So that the dry run environment includes the assigned operation system after the M modification parameter after modification parameter.
It is described in second possible implementation with reference to the first possible implementation of above-mentioned second aspect The control information that acquiring unit is obtained also includes the 3rd control instruction, and the 3rd control instruction is used to control the configuration Unit generates background traffic,
The dispensing unit, is additionally operable to be attached the M the first virtual machine according to second control instruction Afterwards, M first virtual machine is controlled according to the 3rd control instruction and generates the background traffic, so that the simulation There is the background traffic in running environment.
With reference to above-mentioned second aspect, in the third possible implementation of second aspect, the acquiring unit is obtained The control information also include the 4th control instruction, the 4th control instruction is used to indicate by least one second virtual machines In being connected to the dry run environment, each second virtual machine in described at least one second virtual machines is provided with a kind of net Network function,
The dispensing unit, is additionally operable to carrying out the systematic parameter of the assigned operation system according to the configuration parameter After modification, described at least one second virtual machines are connected to by the dry run environment according to the 4th control instruction In, so that the dry run environment includes the assigned operation system after modification parameter and at least one network function.
Can with reference to the first possible implementation to the third of second aspect of above-mentioned second aspect or second aspect Any one implementation in the implementation of energy, in the third possible implementation, the control device also includes:Control Unit processed, analytic unit and display unit,
The acquiring unit, is additionally operable to after the dispensing unit forms the dry run environment, treats described in reception The program of monitoring;
Described control unit, transports for controlling the described program that the acquiring unit is obtained in the dry run environment OK;
The analytic unit, for recording and analyzes the row produced when described program is run in the dry run environment To be reported with the behavior monitoring for obtaining described program;
The display unit, for showing the behavior monitoring report that the analytic unit is obtained.
The third aspect, the embodiment of the present invention provides a kind of control device of security sandbox, including processor, memory, is System bus and communication interface.
The memory is used to store computer executed instructions, and the processor is total by the system with the memory Line connects, when the control device runs, the computer executed instructions of memory storage described in the computing device, To make the control device perform the controlling party of the security sandbox as described in the arbitrary optional mode of first aspect or first aspect Method.
Fourth aspect, the embodiment of the present invention provides a kind of computer-readable recording medium, including computer executed instructions, when security sandbox Described in the computing device of control device during computer executed instructions, control mounted box is performed such as above-mentioned first aspect or the The control method of the security sandbox described in any one implementation of one side.
The control method and device of security sandbox provided in an embodiment of the present invention, can be by control information to security sandbox It is controlled, so that the control device of the security sandbox can generate with assigned operation system the according to the control information One virtual machine, and the systematic parameter to the assigned operation system modifies to form dry run environment.Adopt this The control method that bright embodiment is provided can control the operation that security sandbox is formed and run in actual host by control information The systematic parameter identical assigned operation system of system is used as dry run environment.Therefore, compared in existing security sandbox Fixed running environment, security sandbox is formed under the control of control information in the embodiment of the present invention dry run environment and reality The current operating environment of the operating system run in the main frame of border has higher similarity, so as to program to be monitored imported After the dry run environment, the behavior when program is run in the dry run environment can more really react the journey Sequence behavior in this prior in running environment, and then can more accurately judge whether the program can be to running in actual host Operating system produce harmful act, improve the analysis efficiency of the security sandbox.
Description of the drawings
Fig. 1 is a kind of function system block diagram of security sandbox provided in an embodiment of the present invention;
Fig. 2 for it is provided in an embodiment of the present invention it is a kind of based on software defined network (Software Defined Network, SDN physical system block diagram);
Fig. 3 is a kind of control method flow chart one of security sandbox provided in an embodiment of the present invention;
Fig. 4 is a kind of control method flow chart two of security sandbox provided in an embodiment of the present invention;
Fig. 5 is a kind of control method flow chart three of security sandbox provided in an embodiment of the present invention;
Fig. 6 is a kind of control method flow chart four of security sandbox provided in an embodiment of the present invention;
Fig. 7 is a kind of control method flow chart five of security sandbox provided in an embodiment of the present invention;
Fig. 8 is a kind of structural representation one of the control device of security sandbox provided in an embodiment of the present invention;
Fig. 9 is a kind of structural representation two of the control device of security sandbox provided in an embodiment of the present invention;
Figure 10 is a kind of hardware architecture diagram of the control device of security sandbox provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly retouched State, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.
It should be noted that the terms " and ", a kind of only incidence relation of description affiliated partner, expression can be with There are three kinds of relations, for example, A and B can be represented:Individualism A, while there is A and B, individualism B these three situations.Separately Outward, character "/" herein, typicallys represent forward-backward correlation pair as if a kind of relation of "or".
When the embodiment of the present invention refers to term " comprising " and " having " and their any deformations, it is intended that cover not Exclusive includes.Process, method, system, product or the equipment for for example containing series of steps or unit is not limited to The step of listing or unit, but alternatively also include the step of not listing or unit, or alternatively also include for these Other intrinsic steps of process, method, product or equipment or unit.
As shown in figure 1, for a kind of system functional block diagram of security sandbox provided in an embodiment of the present invention, including user circle Face, network function virtualization (Network Function Virtual, NFV) management and composer, controller and virtualization Functional database.
Wherein, user interface provide human-computer interaction function, corresponding service interface can be provided a user with, including but do not limit Derive and system shape in operating system selection, network architecture design, suspect program importing, analytic function selection, analysis result One or more in the service interfaces such as state monitoring.User can according to the actual requirements by the control of the user interface input correlation Information processed, to control the dry run environment that the security sandbox forms response.
NFV manages the control information for being responsible for input according to user with composer and forms dry run environment, including but not Be limited to the generation of virtual machine, the position distribution of virtual machine, between the resource allocation of virtual machine, the parameter configuration of virtual machine, virtual machine Interface configuration, the closing of virtual machine, and log information collection, collect and analyze work etc., wherein, log information includes The behavior produced when program is run on each virtual machine of record.
Controller can be that SDN controllers are responsible for the generation of flow, flow scheduling, the building of communication link, control instruction Issue and analysis result upload etc..
Wherein, the user interface, NFV management and composer and controller constitute the control device of the security sandbox.
Virtualization database is responsible for providing the information of each type operating system, for NFV management with composer by adjusting There is the first virtual machine of respective operations system with the information generating run of corresponding operating system, specifically can be including but not limited to The information of the operating systems such as Windows, Linux, Android, iOS, Unix and Netware;The virtualization database It is also responsible for providing the second virtual machine for possessing disparate networks function, for example, possesses virtual router, virtual switch, distributed Refusal service is (Distributed Denial of service, DDOS) protection, fire wall, intruding detection system (Intrusion Detection Systems, IDS)/intrusion prevention system (Intrusion Prevention System, IPS), and the network function such as virus, wooden horse, worm killing the second virtual machine.
As shown in Fig. 2 handing over for a kind of physical system based on SDN provided in an embodiment of the present invention, including open virtual Change planes (open vSwitch) and generic server, security sandbox provided in an embodiment of the present invention can be based on the physical assemblies system System is realized.
Wherein, open virtual switch as the security sandbox data forwarding instrument, in the multiple stage generic server A generic server be used to realizing the control function of the security sandbox, the i.e. security sandbox including NFV management composers, Controller and user interface and virtualization storehouse can realize in same generic server, remaining generic service Device is used to dispose each virtual machine that the security sandbox is generated according to the control information of user input.
Exemplary, above-mentioned generic server can be x86 servers.It is understood that when the number of generic server When amount or performance cannot meet the requirement of the security sandbox, directly more generic servers can be connected into virtual switch Machine, as a part for security sandbox system.
Based on above-mentioned security sandbox as shown in Figure 1, as shown in figure 3, the embodiment of the present invention provides a kind of security sandbox Control method, the method can include:
S101, the control device of security sandbox obtain control information, and the control information includes the first control instruction and configuration Parameter.
Wherein, the first control instruction generates the first virtual machine with assigned operation system for indicating the control device, The assigned operation system is the operating system (hereinafter abbreviation practical OS's) run in actual host, and the configuration parameter is used In the systematic parameter for changing the assigned operation system, so that the parameter of first virtual machine is current with the practical OS's Systematic parameter is identical.
In one example, first control instruction can be the series of instructions that user is input into by user interface, example Such as, including operating system selection instruction and determine instruction etc..In this example, user can be according to operation in actual host The icon of selection operation system is clicked in the icon of the operating system that operating system is presented from the user interface, and is selecting to complete Click on afterwards and determine icon, so as to the selection instruction that the control device can be input into according to user by the icon of clicking operation system Determine the assigned operation system, and start to generate that have should by clicking on the determine instruction for determining icon input and determining according to user First virtual machine of assigned operation system.
In one example, the mark of the assigned operation system can also be included in first control instruction, so that should Control device can determine assigned operation system according to the mark of the assigned operation system.
The configuration parameter systematic parameter current with practical OS's is identical, is that user is current according to practical OS's System parameter setting, then the control device is input into by the user interface, to control the control device can be according to this Configuration parameter is modified to the systematic parameter of the assigned operation system, so that the systematic parameter and reality of the assigned operation system The systematic parameter of border operating system is identical.
S102, the control device generate the first virtual machine with the assigned operation system according to first control instruction.
In one example, the NFV layouts in the control device can be according to first control instruction, from void with controller The information of the assigned operation system is called in planization functional database, and is generated with the assigned operation system according to the information First virtual machine.
S103, the control device are modified according to the configuration parameter to the systematic parameter of the assigned operation system, so that The assigned operation system after parameter must be changed and form dry run environment, the dry run environment is used to run journey to be monitored Sequence.
Exemplary, by taking windows operating systems as an example, the control device is according to having that the first control instruction is generated First virtual machine of widows operating systems, now, the systematic parameter of the widows operating systems on first virtual machine is The system configuration parameter of windows operating systems acquiescence.It is assumed that in the system configuration parameter of windows operating systems acquiescence TELNET port parameters are the parameter for indicating the TELNET port shutdowns.And the windows operating systems run in actual host Current TELNET port parameters are the parameter for indicating the TELNET open-endeds.The configuration parameter that the control device is obtained is real The current TELNET port parameters of the windows operating systems of operation on the main frame of border, the control device will according to the configuration parameter The TELNET port parameters of the windows operating systems in first virtual machine are revised as the windows run in actual host The current TELNET port parameters of operating system so that the windows operating systems in the first virtual machine have and actual host The windows operating system identical program execution environments of upper operation.
In one example, can be by what the NFV layouts in the control device and controller performed assigned operation system The modification operation of system parameter.
In embodiments of the present invention, the assigned operation system after using modification parameter is used as dry run environment so that The dry run environment is identical with the current operating environment of practical OS's, so, program to be monitored is input into the mould After intending running environment operation, the behavior when program is run in the dry run environment can reflect more true and reliablely The behavior when program is run in current operating environment, during such that it is able to being run in the dry run environment according to the program Behavior, can more accurately judge that whether the program can produce harmful act to current operating environment, improve this point Analysis efficiency.
Optionally, security sandbox provided in an embodiment of the present invention, can also provide the dry run environment of on-line environment.Tool Body, in one example, the number of the first virtual machine that the control device of the security sandbox is generated is M, and M first virtual The virtual machine of each in machine first has a kind of operating system specified, and M > 1, M is integer, i.e., in this example, the first control Instruction specifically can serve to indicate that the control device generates M the first virtual machine with assigned operation system.So as to reference to such as Fig. 3, as shown in figure 4, in above-mentioned S103, specifically can include:
S103a, the control device are to each the assigned operation system in M assigned operation system according to configuration parameter System parameter is modified.
Further, as shown in figure 4, in above-mentioned S101, the control information that control device is obtained can also include second Control instruction, second control instruction connects the M the first virtual machine for controlling the control device.After above-mentioned S103a, The method can also include:
S104, the control device are attached the M the first virtual machine according to second control instruction, so that simulation Running environment includes the assigned operation system after M modification parameter.
In this example, control device generates M the first virtual machines, and according to configuration parameter by the M assigned operation system The systematic parameter of system is revised as after the systematic parameter identical parameter with M practical OS's, you can referred to according to the second control Order is attached the M the first virtual machine, and to form dry run environment, i.e., now, the dry run environment includes that M is repaiied Change the assigned operation system after parameter.Wherein, M practical OS's can be the M operation run in same actual host System, or it is separately operable in M operating system of M actual host.
So, when the security sandbox receives program to be monitored, and the program is controlled in the simulation by the control device When running in running environment, the behavior that the control device is produced when not only can be run in the simulated environment according to the program, Whether analyze the program can produce attack to single operating, can also analyze the program in M the first virtual machine Whether the network behavior produced during operation has harm.
Wherein, network behavior can include the mode that the program is propagated between M the first virtual machine, for example, using master The leak of machine obtains the trust or authority of other equipment in network, by the program copy to other equipment realizing communication effect Deng the circulation way (for example, the circulation way of virus or wooden horse) with harmfulness.It is exemplary, if the program using virus or The circulation way of wooden horse is propagated between the M the first virtual machine, and the program is rogue program, then the program can be to this Multiple first virtual machines in dry run environment produce attack.Illustrate, when current operating environment is by multiple actual main When the operating system run on machine is constituted, if the program to be imported the behaviour run in certain actual host in current operating environment In making system, then the program not only can produce attack to the operating system, it is also possible to its in the current operating environment The operating system run in his actual host produces attack.
Network behavior can also include, when the program is run in the assigned operation system in certain first virtual machine, be It is no to attempt logging in other first virtual machines in the dry run environment to obtain management by SSH ports, TELNET ports etc. The behaviors such as member's authority.Exemplary, if run in assigned operation system of the program in certain first virtual machine, attempt logical TELNET ports are crossed to other the first virtual machine facility transmission TELNET flows, then it represents that the program is attempted utilizing TELNET ports Control other the first virtual machines.Illustrate, if the program to be imported what is run in certain actual host in current operating environment Operating system, then the program may utilize other actual hosts in the TELNET port controllings current operating environments.
In embodiments of the present invention, control device can obtain packet at random in the data that the program is triggered, and The information such as agreement, port that the program is used are obtained from the packet for obtaining, is existed with the program by these information analyses Whether the network behavior produced when running in the dry run environment has harm.Compared to the only pin of security sandbox in prior art Running environment to single operation system, security sandbox can be formed under the control of control information and is directed in the embodiment of the present invention The dry run environment of M practical OS's, so as to the control device is after program to be imported the dry run environment, moreover it is possible to Enough network behaviors to the program are analyzed, and further increase the analysis efficiency of security sandbox.
Optionally, with reference to Fig. 4, as shown in figure 5, the control information that the control device is obtained in above-mentioned S101 also includes the 3rd Control instruction, the 3rd control instruction is used to control control device generation background traffic, and after above-mentioned S104, the present invention is real Applying the control method of the security sandbox of example offer can also include:
S105, the control device control the M the first virtual machine and generate background traffic according to the 3rd control instruction, so that Obtain the dry run environment and there is the background traffic.
Wherein, the flow produced when background traffic refers to user in current operating environment normally using network, according to difference Purposes, the corresponding industry of network system (i.e. actual motion environment) etc. with different traffic characteristics.For example, in department of banking In system, generally the data of encryption are transmitted using VPN (Virtual Private Network, VPN) between equipment Flow;In the voice communication system of operator, usual transmitting audio data stream amount between equipment;In equity (Peer-to- Peer, P2P) in system, there is provided in the cloud data center of P2P download services, it will usually transmission using P2P host-host protocols data Flow.Some rogue programs may be based on the transmission of the background traffic in current operating environment, produce some harmful networks Behavior.
In embodiments of the present invention, can control to be formed with background traffic in security sandbox by the 3rd control instruction Dry run environment.Exemplary, the 3rd control instruction can include the mark of traffic characteristic, flow forwarding strategy and visit Control strategy etc. is asked, for indicating that the control device of the security sandbox controls the mark that M the first virtual machine generates the traffic characteristic Know corresponding background traffic, and the biography of the background traffic is carried out according to specified flow forwarding strategy and access control policy It is defeated, so that the dry run environment formed in the security sandbox is present and current operating environment identical background traffic.This Sample, when running during program to be monitored subsequently to be imported the dry run environment, you can according to the program in the dry run Behavior when running in environment, analyzes whether the program can be based on the network behavior that the transmission generation of the background traffic is harmful to.
In one example, the life of background traffic in dry run environment can be performed by the controller of the security sandbox Into the controller can send instruction according to the 3rd control instruction to the M the first virtual machine, control the M the first virtual machine The background traffic specified of generation, and the network condition such as the running status and the network bandwidth according to the M the first virtual machine and should Flow forwarding strategy and access control policy that 3rd control instruction is indicated, control the M the first virtual machine to the background stream Amount is forwarded so that the background traffic transmit in dry run environment, with further improve the dry run environment and The similarity of current operating environment, so as to further improve the analysis efficiency of the security sandbox.
Optionally, security sandbox provided in an embodiment of the present invention can also be by with particular network functions at least one Two virtual machines are connected in the dry run environment formed in the method as shown in Fig. 3-5 is arbitrary, at least one second virtual machine In each second virtual machine be provided with a kind of network function.For example, it may be possessing router, fire wall, IDS/IPS, disease Second virtual machine of the network functions such as malicious killing, wooden horse killing.
Exemplary, with reference to Fig. 3, as shown in fig. 6, the control information that control device is obtained in above-mentioned S101 can also include 4th control instruction, the 4th control instruction is used to indicate that at least one second virtual machines are connected to the simulation by the control device In running environment.So as to after above-mentioned S103, the control method of security sandbox provided in an embodiment of the present invention can also be wrapped Include:
At least one second virtual machine is connected to the simulation fortune by S106, the control device according to the 4th control instruction In row environment, so that the dry run environment includes the assigned operation system after modification parameter and at least one network function.
Exemplary, the 4th control instruction can include the mark and line instruction of at least one second virtual machines, should 4th control instruction can be that user is input into by user interface.The control device is according at least one second virtual machine Mark, transfers corresponding at least one second virtual machines from the virtualization database of the security sandbox, and then basis should Line instruction is connected at least one second virtual machines in dry run environment, at least one second virtual machine and will repair Change the first virtual machine after parameter to connect to form dry run environment.
Optionally, the 4th control instruction can also include the mark and networking stencil-chosen of at least one second virtual machines Instruction.In this example, user can be according to the networking model of current operating environment, from the networking template that the user interface is presented List in click on and select corresponding networking template, to be input into the instruction of networking stencil-chosen, so as to the control device can basis The networking stencil-chosen instruction determines corresponding networking template, and then the control device is according to the mark of at least one second virtual machines Know and determine after corresponding at least one second virtual machine, you can by first after at least one second virtual machine and modification parameter Virtual machine is coupled together according to the networking template, forms dry run environment.
Exemplary, the networking template that the security sandbox is provided can include:Based on star, annular, bus-type, tree-like etc. The networking template of basic network topological structure, based on private network the applied environments such as internet, home network, data center are accessed Networking template, and the networking template based on terminal types such as Android device access model, ios device access models.
In one example, network configuration parameters can also be included in the 4th control instruction, the control device can be with root The network parameter of the second virtual machine is modified according to the network configuration parameters, for example, the IP address of the second virtual machine of modification, MAC Address etc., can also change different network configurations to different types of second virtual machine, for example, for server, can be with Modification type of server, for fire wall, protection rule, white list, blacklist etc. can be changed.
What deserves to be explained is, in embodiments of the present invention, can control control device by the 4th control instruction will have Router, fire wall, IDS the network function such as IPS, DDOS protection, checking and killing virus, wooden horse killing, worm killing it is second virtual Machine is added in dry run environment, so, when running during program to be monitored subsequently to be imported the dry run environment, can To be analyzed to the program to be monitored by the network function with function of safety protection in the dry run environment, also Whether behavior that can be according to the program in the dry run environment, analyzing the program can be to the fire prevention in current operating environment The network equipments such as wall, router produce impact, for example, modification switch, the system configuration of router, backstage login fire wall, Authority of modification fire wall etc., so as to further increase the analysis efficiency of the security sandbox.
In one example, the second virtual machine that the security sandbox is provided can also include different brands, different vendor's life Virtual machine corresponding to the security protection product of product, i.e., including different brands, the fire wall of different vendor's production, abnormal flow prison Corresponding second virtual machine of security protection product such as survey and cleaning device, IDS/IPS.When user needs to produce some security protections When product carry out performance test, you can corresponding second virtual machine is connected in dry run environment, then rogue program is imported In the dry run environment, to detect whether second virtual machine can detect and intercept the rogue program.
For example, user have purchased a set of intrusion prevention system, it is desirable to detect that the intrusion prevention system specifically enters to certain Invade mode and whether there is protective capacities, then the user can to control the security sandbox corresponding second empty by the intrusion prevention system Plan machine is connected in dry run environment, then is transported being imported in the dry run environment using the program of the specific invasion mode OK, interception program if the security sandbox fails, the control device of the security sandbox then can according to the program this The behavior that produces when running in two virtual machines, the intrusion behavior for analyzing the program is realized in principle and the intrusion prevention system The leak of presence.For example, if the IPS does not possess the function of TELNET port-guards, then using TELNET ports By corresponding second virtual machine of the IPS by the program invaded, this timed unit can be by analysis The behavior that the program is run in second virtual machine, it is found that the program is to carry out Network Intrusion by TELNET ports, and is somebody's turn to do IPS does not detect the TELNET ports, so as to allow users to accurately determine the Attack Theory of the program and Counter-measure.
Further, in embodiments of the present invention, when the security sandbox is successfully formed dry run ring based on control information After border, you can program to be monitored is imported into the security sandbox, so that the security sandbox can control the program in the mould Intend running environment in run, and the behavior produced when running in the dry run environment to the program recorded, analyze with The behavior monitoring report of the program is obtained, and behavior monitoring report is shown into user by user interface, so as to inform Whether the user program can work the mischief to actual motion environment, work the mischief type, the mode for working the mischief and cause Order of severity of harm etc..
It is exemplary, with reference to Fig. 6, as shown in fig. 7, the control method of security sandbox provided in an embodiment of the present invention can be with Including:
S107, the control device receive the program to be monitored.
Exemplary, the user interface of the security sandbox provides suspect program and imports interface, so as to user can be by being somebody's turn to do Suspect program imports interface and the program program is imported into the security sandbox.
S108, the control device control the program and run in the dry run environment.
After control device receives the program of user's importing, the control device can control the program in the simulation fortune Run in row environment, for example, the controller of the control device can control virtual machine in the dry run environment (including above-mentioned First virtual machine and the second virtual machine), corresponding data traffic is generated according to the instruction of the program, and the data traffic is carried out Forwarding etc..
S109, the control device record and analyze the behavior that produces when the program is run in the dry run environment, with Obtain the behavior monitoring report of the program.
Exemplary, the security sandbox can be transported the program in each virtual machine by log pattern with log enable function The log information is synchronized to NFV layouts and controller by the behavior record produced during row in log information, by VNF layouts The behavior produced when running to the program recorded in these log informations with controller is collected and analysis, determines the program Whether current operating environment can be worked the mischief, and in the case where the program can work the mischief to current operating environment, analysis The type for working the mischief, the mode for working the mischief and the order of severity that works the mischief etc., then obtain according to these analysis results Behavior monitoring to the program is reported.
Wherein, each virtual machine in the log pattern and the dry run environment is affixed one's name on different physical resources, example Such as, based on physical system as shown in Figure 2, the log pattern can be disposed in a single generic server, it is also possible to By the log pattern and the control device (including controller, NFV layouts and controller and user interface) and virtualization number Be deployed in same generic server according to storehouse, so as to avoid the dry run environment in virtual machine collapse under the attack of the program Burst, cause the control device in time to know the behavior that the program is produced when running in virtual machine.
S110, the control device show behavior monitoring report.
It is understood that after NFV layouts and controller are obtained and preserve behavior monitoring report, will can be somebody's turn to do simultaneously Behavior monitoring report is sent to user interface, is shown to user, and the user can also transfer instruction by user interface input, with Behavior monitoring report is checked in the request from the NFV layouts and controller.
Security sandbox can be controlled by control information, so that the control device of the security sandbox being capable of basis The control information generates the first virtual machine with assigned operation system, and the systematic parameter to the assigned operation system is carried out Change to form dry run environment.Can be pacified by control information control using control method provided in an embodiment of the present invention The systematic parameter identical assigned operation system of the operating system run in full sandbox formation and actual host is used as dry run Environment.Therefore, compared to running environment fixed in existing security sandbox, security sandbox is in control letter in the embodiment of the present invention The dry run environment formed under the control of breath has higher with the current operating environment of the operating system of operation in actual host Similarity, so as to after program to be monitored to be imported the dry run environment, the program is transported in the dry run environment Behavior during row, can more really react behavior of the program in this prior in running environment, and then can be more accurate Judge that the operating system that the program whether can be to running in actual host produces harmful act, improve the security sandbox point Analysis efficiency.
As shown in figure 8, the embodiment of the present invention provides a kind of control device of security sandbox, perform as shown in Fig. 3-6 is arbitrary Security sandbox control method the step of, the control device of the security sandbox can be integrated in the security sandbox, exemplary , the control device of the security sandbox includes:
Acquiring unit 10, for obtaining control information, the control information includes the first control instruction and configuration parameter, institute The first control instruction is stated for indicating that dispensing unit 11 generates the first virtual machine with assigned operation system, the configuration parameter For changing the systematic parameter of the operating system.
The dispensing unit 11, first control instruction for being obtained according to the acquiring unit 10 is generated has institute State first virtual machine of assigned operation system.
The dispensing unit 11, for the configuration parameter that obtained according to the acquiring unit 10 to the assigned operation The systematic parameter of system is modified, so that the assigned operation system after modification parameter forms dry run environment, institute Dry run environment is stated for running program to be monitored.
Optionally, the number of first virtual machine that the dispensing unit 11 is generated is M, in M the first virtual machine Each first virtual machine there is a kind of assigned operation system, M > 1, M is integer.
The dispensing unit 11, specifically for being specified to each in M assigned operation system according to the configuration parameter The systematic parameter of operating system is modified.
The control information that the acquiring unit 10 is obtained also includes the second control instruction, and second control instruction is used Connect the M the first virtual machine in the dispensing unit 11 is controlled.
The dispensing unit 11, is additionally operable to specifying each in M assigned operation system according to the configuration parameter After the systematic parameter of operating system is modified, the M the first virtual machine is connected according to second control instruction Connect, so that the dry run environment includes the assigned operation system after the M modification parameter after modification parameter.
Optionally, the control information that the acquiring unit 10 is obtained also includes the 3rd control instruction, the 3rd control System instruction generates background traffic for controlling the dispensing unit 11.
The dispensing unit 11, is additionally operable to connected the M the first virtual machine according to second control instruction After connecing, M first virtual machine is controlled according to the 3rd control instruction and generates the background traffic, and to the background Flow is forwarded, so that the dry run environment has the background traffic.
Optionally, the control information that the acquiring unit 10 is obtained also includes the 4th control instruction, the 4th control System instruction is for indicating that at least one second virtual machines are connected in the dry run environment, and described at least one second is empty Each second virtual machine in plan machine is provided with a kind of network function.
The dispensing unit 11, is additionally operable to entering the systematic parameter of the assigned operation system according to the configuration parameter After row modification, described at least one second virtual machines are connected to by the dry run environment according to the 4th control instruction In, so that the dry run environment includes the assigned operation system after modification parameter and at least one network function.
Optionally, with reference to Fig. 8, as shown in figure 9, the control device also includes:Control unit 12, analytic unit 13 and Display unit 14,
The acquiring unit 10, is additionally operable to after the dispensing unit 11 forms the dry run environment, receives institute State program to be monitored.
Described control unit 12, for controlling the described program of the acquisition of the acquiring unit 10 in the dry run environment Middle operation.
The analytic unit 13, for recording and analyzes what is produced when described program is run in the dry run environment Behavior, is reported with the behavior monitoring for obtaining described program.
The display unit 14, for showing the behavior monitoring report that the analytic unit 13 is obtained.
A kind of control device of security sandbox provided in an embodiment of the present invention, can be entered by control information to security sandbox Row control, so that the control device of the security sandbox can generate with assigned operation system first according to the control information Virtual machine, and the systematic parameter to the assigned operation system modifies to form dry run environment.I.e. using the present invention The control method that embodiment is provided can control the operation system that security sandbox is formed and run in actual host by control information The systematic parameter identical assigned operation system of system is used as dry run environment.Therefore, it is solid compared in existing security sandbox Fixed running environment, security sandbox is formed under the control of control information in the embodiment of the present invention dry run environment and reality The current operating environment of the operating system run in main frame has higher similarity, so as to program importing to be monitored be somebody's turn to do After dry run environment, the behavior when program is run in the dry run environment can more really react the program Behavior in running environment in this prior, and then can more accurately judge whether the program can be to running in actual host Operating system produces harmful act, improves the analysis efficiency of the security sandbox.
As shown in Figure 10, the embodiment of the present invention provides a kind of control device of security sandbox, including:Processor 20, storage Device 21, system bus 22 and communication interface 23.
The memory 21 is used to store computer executed instructions, and the processor 20 is with the memory 21 by described System bus 22 connects, and when the control device of the security sandbox runs, the processor 20 performs the memory 21 and deposits The computer executed instructions of storage, so that the control device of the security sandbox is performed as described in Fig. 3 to Fig. 7 is one of any The control method of security sandbox.The control method of specific security sandbox can be found in above-mentioned as shown in Fig. 3 to Fig. 7 is one of any Associated description in embodiment, here is omitted.
The present embodiment also provides a kind of storage medium, and the storage medium can include the memory 21.
The processor 20 can be central processing unit (English:Central processing unit, abbreviation:CPU). The processor 20 can also be other general processors, digital signal processor (English:digital signal Processing, abbreviation DSP), special IC (English:application specific integrated Circuit, abbreviation ASIC), field programmable gate array (English:Field-programmable gate array, referred to as FPGA) either other PLDs, discrete gate or transistor logic, discrete hardware components etc..General procedure Device can be microprocessor or the processor can also be any conventional processor etc..
The processor 20 can be application specific processor, and the application specific processor can include the dress of the control with security sandbox Put the chip of other dedicated processes functions.
The memory 21 can include volatile memory (English:Volatile memory), such as arbitrary access is deposited Reservoir (English:Random-access memory, abbreviation:RAM);The memory 21 can also include nonvolatile memory (English:Non-volatile memory), such as read-only storage (English:Read-only memory, abbreviation:ROM), soon Flash memory (English:Flash memory), hard disk (English:Hard disk drive, abbreviation:) or solid state hard disc (English HDD Text:Solid-state drive, abbreviation:SSD);The memory 21 can also include the combination of the memory of mentioned kind.
The system bus 22 can include data/address bus, power bus, controlling bus and signal condition bus etc..This reality Apply in example for clear explanation, in Fig. 10 various buses are all illustrated as into system bus 22.
The communication interface 23 can be specifically on the control device of security sandbox the processor 20 by setting with other The standby interface for being communicated.
During implementing, it is above-mentioned as Fig. 3 to Fig. 7 one of arbitrarily shown in method flow in each step can be with The computer executed instructions for performing the software form stored in memory 21 by the processor 20 of example, in hardware are realized.To avoid Repeat, here is omitted.
A kind of control device of security sandbox provided in an embodiment of the present invention, can be entered by control information to security sandbox Row control, so that the control device of the security sandbox can generate with assigned operation system first according to the control information Virtual machine, and the systematic parameter to the assigned operation system modifies to form dry run environment.I.e. using the present invention The control method that embodiment is provided can control the operation system that security sandbox is formed and run in actual host by control information The systematic parameter identical assigned operation system of system is used as dry run environment.Therefore, it is solid compared in existing security sandbox Fixed running environment, security sandbox is formed under the control of control information in the embodiment of the present invention dry run environment and reality The current operating environment of the operating system run in main frame has higher similarity, so as to program importing to be monitored be somebody's turn to do After dry run environment, the behavior when program is run in the dry run environment can more really react the program Behavior in running environment in this prior, and then can more accurately judge whether the program can be to running in actual host Operating system produces harmful act, improves the analysis efficiency of the security sandbox.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each function The division of module is illustrated, and in practical application, as desired can distribute above-mentioned functions by different function moulds Block is completed, will the internal structure of device be divided into different functional modules, to complete all or part of work(described above Energy.The specific work process of the system, apparatus, and unit of foregoing description, may be referred to corresponding in preceding method embodiment Journey, will not be described here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above be only it is schematic, for example, the module or The division of unit, only a kind of division of logic function can have other dividing mode, such as multiple units when actually realizing Or component can with reference to or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, institute The coupling each other for showing or discussing or direct-coupling or communication connection can be by some interfaces, device or unit INDIRECT COUPLING or communication connection.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can according to the actual needs be selected to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit can be realized in the form of SFU software functional unit.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, during a computer read/write memory medium can be stored in.Based on such understanding, all or part of the technical scheme Can be embodied in the form of software product, the computer software product is stored in a storage medium, including some fingers Order is used so that a computer equipment (can be personal computer, server, or network equipment etc.) or computing device The all or part of step of each embodiment methods described of the invention.The storage medium is non-transitory (English:non- Transitory) medium, including:Flash memory, portable hard drive, read-only storage, random access memory, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, all should contain Cover within protection scope of the present invention.Therefore, protection scope of the present invention described should be defined by scope of the claims.

Claims (10)

1. a kind of control method of security sandbox, it is characterised in that methods described includes:
The control device of security sandbox obtains control information, and the control information includes the first control instruction and configuration parameter, institute The first control instruction is stated for indicating that the security sandbox generates the first virtual machine with assigned operation system, the configuration ginseng Number is used to change the systematic parameter of the operating system;
The control device generates first virtual machine with the assigned operation system according to first control instruction;
The control device is modified according to the configuration parameter to the systematic parameter of the assigned operation system, so that repairing Change the assigned operation system after parameter and form dry run environment, the dry run environment is used to run journey to be monitored Sequence.
2. method according to claim 1, it is characterised in that the number of first virtual machine is M, M first empty Each first virtual machine in plan machine has a kind of assigned operation system, and M > 1, M is integer,
The control device is modified according to the configuration parameter to the systematic parameter of the assigned operation system, including:
The control device is joined according to the configuration parameter to the system of each the assigned operation system in M assigned operation system Number is modified;
The control information also includes the second control instruction, and second control instruction is used to control the control device connection institute M the first virtual machine is stated, the control device is according to the configuration parameter to each assigned operation in M assigned operation system After the systematic parameter of system is modified, methods described also includes:
The control device is attached the M the first virtual machine according to second control instruction, so that the mould Intending running environment includes the assigned operation system after M modification parameter.
3. method according to claim 2, it is characterised in that the control information also includes the 3rd control instruction, described 3rd control instruction is used to control the control device generation background traffic, and the control device is according to second control instruction After the M the first virtual machine is attached, methods described also includes:
The control device controls M first virtual machine and generates the background traffic according to the 3rd control instruction, with So that there is the background traffic in the dry run environment.
4. method according to claim 1, it is characterised in that the control information also includes the 4th control instruction, described 4th control instruction be used for indicate that the control device is connected at least one second virtual machines in the dry run environment, Each second virtual machine in described at least one second virtual machines is provided with a kind of network function, and the control device is according to institute State after configuration parameter modifies to the systematic parameter of the assigned operation system, methods described also includes:
Described at least one second virtual machines are connected to the simulation fortune by the control device according to the 4th control instruction In row environment, so that the dry run environment includes the assigned operation system after modification parameter and at least one network Function.
5. the method according to any one of claim 1-4, it is characterised in that the control device forms the dry run After environment, methods described also includes:
The control device receives the program to be monitored;
The control device control described program is run in the dry run environment;
The control device records and analyzes the behavior that produces when described program is run in the dry run environment, to obtain The behavior monitoring report of described program;
The control device shows the behavior monitoring report.
6. a kind of control device of security sandbox, it is characterised in that include:
Acquiring unit, for obtaining control information, the control information includes the first control instruction and configuration parameter, described first Control instruction is used to indicate that dispensing unit generates the first virtual machine with assigned operation system that the configuration parameter to be used to change The systematic parameter of the operating system;
The dispensing unit, first control instruction for being obtained according to the acquiring unit is generated has the specified behaviour Make first virtual machine of system;
The dispensing unit, the configuration parameter for being obtained according to the acquiring unit is to the assigned operation system System parameter is modified, so that the assigned operation system after modification parameter forms dry run environment, the simulation fortune Row environment is used to run program to be monitored.
7. control device according to claim 6, it is characterised in that first virtual machine that the dispensing unit is generated Number be M, each first virtual machine in M the first virtual machine has a kind of assigned operation system, and M > 1, M is integer,
The dispensing unit, specifically for according to the configuration parameter to each the assigned operation system in M assigned operation system The systematic parameter of system is modified;
The control information that the acquiring unit is obtained also includes the second control instruction, and second control instruction is used to control The dispensing unit connects M first virtual machine,
The dispensing unit, be additionally operable to according to the configuration parameter to each the assigned operation system in M assigned operation system After the systematic parameter of system is modified, the M the first virtual machine is attached according to second control instruction, so that Obtaining the dry run environment includes the assigned operation system after the M modification parameter after modification parameter.
8. control device according to claim 7, it is characterised in that the control information that the acquiring unit is obtained is also Including the 3rd control instruction, the 3rd control instruction is used to control the dispensing unit generation background traffic,
The dispensing unit, is additionally operable to after according to second control instruction M the first virtual machine is attached, M first virtual machine is controlled according to the 3rd control instruction and generates the background traffic, so that the dry run There is the background traffic in environment.
9. control device according to claim 6, it is characterised in that the control information that the acquiring unit is obtained is also Including the 4th control instruction, the 4th control instruction is used to indicate at least one second virtual machines to be connected to the simulation fortune In row environment, each second virtual machine in described at least one second virtual machines is provided with a kind of network function,
The dispensing unit, is additionally operable to modifying the systematic parameter of the assigned operation system according to the configuration parameter Afterwards, described at least one second virtual machines are connected in the dry run environment according to the 4th control instruction, with So that the dry run environment includes the assigned operation system after modification parameter and at least one network function.
10. the control device according to any one of claim 6-9, it is characterised in that the control device also includes:Control Unit, analytic unit and display unit,
The acquiring unit, is additionally operable to after the dispensing unit forms the dry run environment, receives described to be monitored Program;
Described control unit, runs for controlling the described program that the acquiring unit is obtained in the dry run environment;
The analytic unit, for recording and analyzes the behavior produced when described program is run in the dry run environment, To obtain the behavior monitoring report of described program;
The display unit, for showing the behavior monitoring report that the analytic unit is obtained.
CN201611111596.8A 2016-12-06 2016-12-06 A kind of control method and device of security sandbox Active CN106650425B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611111596.8A CN106650425B (en) 2016-12-06 2016-12-06 A kind of control method and device of security sandbox

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611111596.8A CN106650425B (en) 2016-12-06 2016-12-06 A kind of control method and device of security sandbox

Publications (2)

Publication Number Publication Date
CN106650425A true CN106650425A (en) 2017-05-10
CN106650425B CN106650425B (en) 2019-08-09

Family

ID=58818445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611111596.8A Active CN106650425B (en) 2016-12-06 2016-12-06 A kind of control method and device of security sandbox

Country Status (1)

Country Link
CN (1) CN106650425B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875362A (en) * 2017-12-28 2018-11-23 北京安天网络安全技术有限公司 A kind of sample behavior acquisition methods, device, storage medium and electronic equipment
CN108919774A (en) * 2018-06-01 2018-11-30 武汉康慧然信息技术咨询有限公司 Mixed electrical automobile safety traffic control method
CN110515670A (en) * 2019-09-03 2019-11-29 深圳市路畅科技股份有限公司 A kind of operation method of embedded device, system and a kind of host computer
CN111541675A (en) * 2020-04-17 2020-08-14 国家计算机网络与信息安全管理中心山东分中心 Network security protection method, device and equipment based on white list
CN113778991A (en) * 2021-09-14 2021-12-10 珠海市新德汇信息技术有限公司 Method for realizing resource access control of big data
CN113949579A (en) * 2021-10-20 2022-01-18 安天科技集团股份有限公司 Website attack defense method and device, computer equipment and storage medium
CN115733694A (en) * 2022-11-21 2023-03-03 赵杰 Security access control system based on meta universe

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102387044A (en) * 2011-06-27 2012-03-21 中国商用飞机有限责任公司 Method for testing communication network
CN102662727A (en) * 2012-04-05 2012-09-12 北京天地云箱科技有限公司 Virtual machine creating method and virtual machine creating device
CN103248535A (en) * 2013-04-28 2013-08-14 华为技术有限公司 Cloud system testing method and device
CN105306594A (en) * 2015-11-19 2016-02-03 国云科技股份有限公司 Method for managing virtual unit through multiple strategies

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102387044A (en) * 2011-06-27 2012-03-21 中国商用飞机有限责任公司 Method for testing communication network
CN102662727A (en) * 2012-04-05 2012-09-12 北京天地云箱科技有限公司 Virtual machine creating method and virtual machine creating device
CN103248535A (en) * 2013-04-28 2013-08-14 华为技术有限公司 Cloud system testing method and device
CN105306594A (en) * 2015-11-19 2016-02-03 国云科技股份有限公司 Method for managing virtual unit through multiple strategies

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875362A (en) * 2017-12-28 2018-11-23 北京安天网络安全技术有限公司 A kind of sample behavior acquisition methods, device, storage medium and electronic equipment
CN108919774A (en) * 2018-06-01 2018-11-30 武汉康慧然信息技术咨询有限公司 Mixed electrical automobile safety traffic control method
CN108919774B (en) * 2018-06-01 2019-11-29 温岭市海奔光电科技股份有限公司 Mixed electrical automobile safety traffic control method
CN110515670A (en) * 2019-09-03 2019-11-29 深圳市路畅科技股份有限公司 A kind of operation method of embedded device, system and a kind of host computer
CN111541675A (en) * 2020-04-17 2020-08-14 国家计算机网络与信息安全管理中心山东分中心 Network security protection method, device and equipment based on white list
CN113778991A (en) * 2021-09-14 2021-12-10 珠海市新德汇信息技术有限公司 Method for realizing resource access control of big data
CN113778991B (en) * 2021-09-14 2024-07-05 珠海市新德汇信息技术有限公司 Method for realizing resource access control of big data
CN113949579A (en) * 2021-10-20 2022-01-18 安天科技集团股份有限公司 Website attack defense method and device, computer equipment and storage medium
CN113949579B (en) * 2021-10-20 2024-04-30 安天科技集团股份有限公司 Website attack defense method and device, computer equipment and storage medium
CN115733694A (en) * 2022-11-21 2023-03-03 赵杰 Security access control system based on meta universe

Also Published As

Publication number Publication date
CN106650425B (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN106650425A (en) Method and device for controlling security sandbox
US10560434B2 (en) Automated honeypot provisioning system
CN110752961B (en) Techniques for secure personalization of secure monitoring of virtual network functions
US10382469B2 (en) Domain age registration alert
RU2677378C2 (en) Systems and methods for network analysis and reporting
US9954896B2 (en) Preconfigured honey net
US8782796B2 (en) Data exfiltration attack simulation technology
US8516586B1 (en) Classification of unknown computer network traffic
CA2943271C (en) Method and system for providing security aware applications
CN109766700A (en) Access control method and device, the storage medium, electronic device of file
EP3891953A1 (en) Automatic generation of security rules for network micro and nano segmentation
EP3132349A1 (en) Method and system for providing self-monitoring, self-reporting, and self-repairing virtual assets in a cloud computing environment
CN104506507A (en) Honey net safeguard system and honey net safeguard method for SDN (self-defending network)
US20170134400A1 (en) Method for detecting malicious activity on an aircraft network
US20120134271A1 (en) Identification of underutilized network devices
JP2016508353A (en) Improved streaming method and system for processing network metadata
CN111092910B (en) Database security access method, device, equipment, system and readable storage medium
CN109144023A (en) A kind of safety detection method and equipment of industrial control system
KR102088308B1 (en) Cloud security analysing apparatus, apparatus and method for management of security policy based on nsfv
JP2019097133A (en) Communication monitoring system and communication monitoring method
JP2022521833A (en) Graph stream mining pipeline for efficient subgraph detection
US9774628B2 (en) Method for analyzing suspicious activity on an aircraft network
Rubio et al. Tracking apts in industrial ecosystems: A proof of concept
JP6962374B2 (en) Log analyzer, log analysis method and program
Demırcı et al. Virtual security functions and their placement in software defined networks: A survey

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant